Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2021-10-04 18:15
Updated : 2023-11-07 03:35
NVD link : CVE-2021-32672
Mitre link : CVE-2021-32672
CVE.ORG link : CVE-2021-32672
JSON object : View
Products Affected
redhat
- enterprise_linux
- software_collections
fedoraproject
- fedora
netapp
- management_services_for_element_software
- management_services_for_netapp_hci
redis
- redis
oracle
- communications_operations_monitor
debian
- debian_linux
CWE
CWE-125
Out-of-bounds Read
